`
天梯梦
  • 浏览: 13640901 次
  • 性别: Icon_minigender_2
  • 来自: 洛杉矶
社区版块
存档分类
最新评论

Ubuntu 查看哪些设备链接wifi[How To] Find What Devices Are Connected to Network In Ubuntu

 
阅读更多

Wireless Network are the most easy as well as desirable target for wannabe hackers. Ever wondered that someone might be leeching of your hard paid wifi network? You may opt out for an expensive way to keep the hackers away by buying hacker-proof wallpapers for your home but that really is far fetched. An easy and free way is to scan your network for the device connected with it. This way you can find out if some unknown or unwanted device is connected to it.

We will use terminal for finding out what devices are connected to your network in Linux. The process is very simple and easy to use even for beginners. Here we go:

 

Get nmap:

nmap is one of the most popular network scanning tool in Linux. Use the following command to install nmap in Ubuntu:

sudo apt-get install nmap

 

Get IP range of the network:

Now we need to know the IP address range of the network. Use the ifconfig command to find it out. Look for wlan0 if you are using wifi or eth0 if you are using Ethernet.

user@user-notebook:~$ ifconfig

wlan0 Link encap:Ethernet HWaddr 70:f1:a1:c2:f2:e9
inet addr:192.168.1.91 Bcast:192.168.1.255 Mask:255.255.255.0
inet6 addr: fe80::73f1:a1ef:fec2:f2e8/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:2135051 errors:0 dropped:0 overruns:0 frame:0
TX packets:2013773 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:1434994913 (1.4 GB) TX bytes:636207445 (636.2 MB)

The important things are highlighted in bold. As you see my IP is 192.168.1.91 and the subnet mask is 255.255.255.0 which means that the ip address range on my network varies from 192.168.1.0 to 192.168.1.255.

 

Scan the network:

It is advisable to use root privileges while scanning the network for more accurate information. Use the nmap command in following way:

user@user-notebook:~$ sudo nmap -sP 192.168.1.0/24
Starting Nmap 5.21 ( http://nmap.org ) at 2012-09-01 21:59 CEST

Nmap scan report for neufbox (192.168.1.1)
Host is up (0.012s latency).
MAC Address: E0:A1:D5:72:5A:5C (Unknown)
Nmap scan report for takshak-bambi (192.168.1.91)
Host is up.
Nmap scan report for android-95b23f67te05e1c8 (192.168.1.93)
Host is up (0.36s latency).

As you can see there three devices connected to my network. The router itself, my laptop and my Galaxy S2. What is connected to your network?

 

from:http://itsfoss.com/how-to-find-what-devices-are-connected-to-network-in-ubuntu/

 

分享到:
评论

相关推荐

    Top-k Structure Holes Detection Algorithm in Social Network

    How to find more accurate structural holes has become a key problem in the research. In this paper, we proposed a method to detect the top-k structure holes based on the shortest path increment. It ...

    HBR_How-Smart-Connected-Products-Are-Transforming-Competition

    How-Smart-Connected-Products-Are-Transforming-Competition

    Wireless Network Watcher v1.46

    network and displays the list of all computers and devices that are currently connected to your network. For every computer or device that is connected to your network, the following information is ...

    A survey of security and privacy in connected vehicles 车联网安全综述论文

    A vehicle that uses an external network, in addition to the in-vehicle network, is called connected vehicle. A connected vehicle could benefit from smart mobility applications: applications that use ...

    USBDeview v1.43 - View all installed/connected USB devices on your system

    USBDeview also allows you to uninstall USB devices that you previously used, and disconnect USB devices that are currently connected to your computer. You can also use USBDeview on a remote computer,...

    Wifi Scanner 2.7.4

    Fast IP scanner that detects unknown devices connected to your WiFi network. Detects hostnames, determines the MAC address, and in some cases can auto-detect device type (phone, laptop, router, etc). ...

    Android Cookbook, 2nd Edition 2017年出版766页

    Chapter 15 discusses how to find a device’s loca‐ tion, how to get map data from Google and OpenStreetMap, and how applications can be location-aware in ways that are just now being explored. ...

    C Programming for Arduino

    You’ll learn C and how to code several types of firmware for your Arduino, and then move on to design small typical systems to understand how handling buttons, leds, LCD, network modules and much ...

    Windows_Networking_Troubleshooting

    Whatever version of Windows you are using, you will need a stable Internet connection and access to your company network and its shared files and resources. When a network connection fails, it can ...

    AAA and Network Security for Mobile Access.pdf

    IPsec are not enough alone to operate a network that needs to generate services and revenues or to protect its constituency. Access to the network needs to be controlled. Users and devices need to be ...

    Personal.Cybersecurity.epub

    acquired or company-issued devices: desktop PCs, laptops, mobile devices, smart TVs, WiFi and Bluetooth peripherals, and IoT objects embedded with network-connected sensors. In all these modes, the ...

    SAS-the-internet-of-things

    the IoT to soar to tens of billions of devices by 2020, no one knows how many or what new types of intelligent devices will emerge. Whether these definitions and forecasts are accurate is really not ...

    MicroPython for the Internet of Things-Apress(2017).pdf

    You may have heard of “connected devices” or “Internet-ready” or even “cloud-enabled.” All of these refer to the same thing — be it a single device such as a toaster or a plant monitor or a ...

    Professional Microsoft Windows Embedded CE 6.0

    This book is for developers who are interested in learning what resources are available as part of the Windows Embedded CE tool chains and how to use them. A basic understanding of Visual C++, C#, or ...

    CCNA2-chap1(answer)

    What can be concluded about how packets are forwarded in this network? (Choose two.) 19、What header address information does a router change in the information it receives from an attached Ethernet...

    Operating the Internet因特网指南.pdf

    if you are connected to a regional network (which is gatewayed to the NSFnet, which is connected to the ARPAnet...) and have a problem, you should contact your regional network operations center.

    Graph Algorithms: Practical Examples in Apache Spark and Neo4j

    You’ll learn how graph analytics are uniquely suited to unfold complex structures and reveal difficult-to-find patterns lurking in your data. Whether you are trying to build dynamic network models ...

    An In-Depth Analysis of the Security of the Connected Repair Shop

    delivering diagnostics services to the connected car in future connected repair shops. The repair shop will mainly provide two services; vehicle diagnostics and software download. We analyse the ...

    Cisco Press - OSPF Network Design Solutions, 2nd Edition

    Chapter 10 BGP and MPLS in an OSPF Network 655 Part IV Additional OSPF Resources 707 Appendix A OSPF RFCs 705 Index 724 0323FMf.book Page vi Wednesday, March 12, 2003 9:41 AM vii Contents Introduction...

    计算机网络第六版答案

    23. The five layers in the Internet protocol stack are – from top to bottom – the application layer, the transport layer, the network layer, the link layer, and the physical layer. The principal ...

Global site tag (gtag.js) - Google Analytics